af

Disruption tolerant network technologies are becoming successful solutions that allow wireless devices carried by soldiers to communicate with each other and access the confidential information or command reliably by exploiting external storage nodes. Some of the most challenging issues in this scenario are the enforcement of authorization policies and the policies update for secure data retrieval. Ciphertext policy attribute-based encryption is a promising cryptographic solution to the access control issues. However, the problem of applying CP-ABE in decentralized DTNs introduces several security and privacy challenges with regard to the attribute revocation, key escrow, and coordination of attributes issued from different authorities. we propose a secure data retrieval scheme using IDEA for decentralized DTNs where multiple key authorities manage their attributes independently. We demonstrate how to apply the proposed mechanism to securely and efficiently manage the confidential data distributed in the disruption-tolerant military network.

Citation

:

af

Atish Budhhe, Prof. Hirendra R. Hajare ,"Censored Data Transmission in Decentralized Between Two Army Station”, Macaw International Journal of advanced Research in Computer Science and Engineering (MIJARCSE), 2(12):1-4,December-2016.

af

Now a day’s agriculture is the major source for the largest population in India to earn money and carry out their livelihood. Precision agriculture is already adopted in other countries, but we still need to involve IoT and cloud computing technologies for better production of crops. IoT will be beneficial to connect the devices, collect and distribute the information. Cloud adoption is expected to increase significantly in near future due to improved cloud hosting facilities and faster internet speeds. This will increase the profit of the farmers and also end users can get good quality product in fewer prices as they will directly buy from farmers.

Citation

:

af

Lalchand G. Titare, Prof. Riya Qureshi, “Cloud based IoT for Agriculture in India”, Macaw International Journal of advanced Research in Computer Science and Engineering (MIJARCSE), 2(12):5-10,December-2016.

af

The Mobile App is an extremely mainstream and understood idea because of the fast headway in the portable innovation. Because of the vast number of versatile Apps, positioning misrepresentation is the key test before the portable App market. Positioning misrepresentation alludes to fake or helpless exercises which have a reason for knocking up the Apps in the fame list. While the significance and need of averting positioning misrepresentation has been generally perceived. In the current framework the main occasion and driving session of an application is recognized from the gathered authentic records. At that point three distinct sorts of proofs are gathered from the client criticisms to be specific positioning based confirmation, rating based confirmation and audit based confirmation. These three confirmations are totaled by utilizing proof total strategy. In the proposed framework furthermore, we are proposing two improvements. Firstly, we are utilizing Approval of scores by the administrator to recognize the precise surveys and rating scores. Furthermore, the fake inputs by a same individual for pushing up that application on the pioneer board are limited. Two distinct imperatives are considered for tolerating the criticism given to an application. The principal requirement is that an application can be appraised just once from a client login and the second is executed with the guide of IP address that constrains the quantity of client login logged every day. At last, the proposed framework will be assessed with genuine App information which is to be gathered from the App Store for quite a while period.

Citation

:

af

Dr.R.RAMACHANDRA et al. ," A New Approach to discovery the Fraud Apps”, Macaw International Journal of Advanced Research in Computer Science and Engineering, 2(10):1-5,October-2016.

af

File sharing applications in mobile ad hoc networks (MANETs) have admiring added and added absorption in contempt years. The ability of book querying suffers from the characteristic backdrop of such networks including bulge advancement and bound advice ambit and resource. An automatic adjustment to allay this botheration is to actualize book replicas in the network. However, admitting the efforts on book replication, no analysis has focused on the all-around optimal replica conception with minimum boilerplate querying delay. Specifically, accepted book archetype protocols in adaptable ad hoc networks accept two shortcomings. First, they abridgement a aphorism to admeasure bound assets to altered files in adjustment to abbreviate the boilerplate querying delay. Second, they artlessly accede accumulator as accessible assets for replicas, but carelessness the actuality that the book holders’ abundance of affair added nodes as well plays an important role in free book availability. Actually, a bulge that has a college affair abundance with others provides college availability to its files. This becomes even added axiomatic in sparsely broadcast MANETs, in which nodes accommodated disruptively. In this paper, we acquaint a new abstraction of ability for book replication, which considers both bulge accumulator and affair frequency. We apparently abstraction the access of ability allocation on the boilerplate querying adjournment and acquire an ability allocation aphorism to abbreviate the boilerplate querying delay. We added adduce a broadcast book archetype agreement to apprehend the proposed rule. Extensive trace-driven abstracts with actinic traces and absolute traces appearance that our agreement can accomplish beneath boilerplate querying adjournment at a lower amount than accepted archetype protocols.

af

Nowadays Computing has led to an increase in energy consumption, global warming and e-waste. The environmental impact of computing is alarming, hence the dire need for green initiatives by governments and organizations towards sustainable future. There are various approaches and assumptions of green IT solutions and energy efficient practices in computing. Thrust of computing was initially on faster analysis and speedier calculation and solving of more complex problems. But in the recent past another focus has got immense importance and that is achievement of energy conservation of e-equipments. Green Computing is now under the attention of not only environmental organizations, but also businesses from other industries. It has also given utmost attention to minimization of ewaste and use of non-toxic materials in preparation of e-equipments. In recent years, companies in the computer industry have come to realize that going green is in their best interest, both in terms of public relations and reduced costs.

af

Access control mechanisms protect sensitive information from unauthorized users. However, when sensitive information is shared and a Privacy Protection Mechanism (PPM) is not in place, an authorized user can still compromise the privacy of a person leading to identity disclosure. A PPM can use suppression and generalization of relational data to anonymize and satisfy privacy requirements, e.g., k-anonymity and l-diversity, against identity and attribute disclosure. However, privacy is achieved at the cost of precision of authorized information. In this paper, we propose an accuracy-constrained privacy-preserving access control framework

af

Benefited from cloud computing, users can achieve an effective and economical approach for data sharing among group members in the cloud with the characters of low maintenance and little management cost. Meanwhile, we must provide security guarantees for the sharing data files since they are outsourced. Unfortunately, because of the frequent change of the membership, sharing data while providing privacy-preserving is still a challenging issue, especially for an untrusted cloud due to the collusion attack. Moreover, for existing schemes, the security of key distribution is based on the secure communication channel, however, to have such channel is a strong assumption and is difficult for practice

af

Big data is a term for data sets that are so large or complex that traditional data processing applications are inadequate.Extracting useful information from dataset measuring in gigabytes and tetra bytes is a real challenge for data miners. In this paper I discuss and analyze opportunities and challenges for efficient parallel data processing. Big Data is the next frontier for innovation, competition, and productivity, and many solutions continue to appear, partly supported by the considerable enthusiasm around the Map Reduce paradigm for large-scale data analysis. Map Reduce is a programming model and an associated implementation for processing and generating large data sets with a parallel, distributed algorithm on a cluster. I review various parallel and distributed programming paradigms, analyzing how they fit into the Big Data era, and present modern emerging paradigms and frameworks. With “Big Data” now becoming a reality, more programmers are interested in building programs on the parallel model and they often find SQL an unfamiliar and restrictive way to wrangle data and write code. The biggest game-changer to come along is Map Reduce, the parallel programming framework that has gained prominence thanks to its use at web search companies.

af

Services based on location will play a crucial role in this 21st century era. In this regard the current technology will play an important role in location tracking, providing security and in surveillance. With the advent of smart phones, pagers and smart android based devices and apps it become very easy for the parents who want to know about their children location, Apart from this technology is playing a big role in reducing crime and ethical hacking through cyber security and its impact are at its maximum tone. In this paper we are proposing an application which gives an option to track the location of a second party through their mobiles. This application retains log file which contains user’s current location and keep informs the location to the server. For authentication purpose the details will be saved in an encrypted manner for the concerned party.

af

In recent partitioning of database and distributing among these databases to multiple clients is emerged in data mining. Data mining is the depiction out of obscure examples from walloping information. Association rule mining distinguishes the connections among the attributes of the information. Mining from taken information bases is tough because the data ought to not be unveiled among the databases.

af

In data mining for retrieving huge amount of data ,the keywords plays important role and Keyword query uses a search engine or KUI which provides the user friendly environment, but while searching documents keyword queries suffer poor ranking quality of documents retrieval with a low precision or recall. The hard query or difficult query will decrease the retrieval accuracy

af

Over the past few years, Companies have been moving IT Resources to the cloud at a rapidly increasing rate. The data owners are commanded to outsource their data to cloud servers for amazing security and reduced expense in data management. However, sensitive content would be encrypted before outsourcing for security concerned, which obsoletes data employment like keyword-based document retrieval. In this paper, we solve the problem of multi-keyword ranked search over encrypted cloud data (MRSE) which simultaneously supports dynamic update operations like deletion and insertion of documents wise privacy in the cloud computing concept. As a result, allowing an encrypted cloud data search service is of extreme impact. In view of a large number of data users and documents in the cloud, it is essential to permit several keywords in the search demand and return documents in the order of their relevant to these keywords. Also, we propose an alert system which will generate alerts when the un-authorized user tries to access the data from the cloud, the alert will generate in the form of mail and message. And the ElGamal Cryptosystem allow users to occupy in the ranking while the popularity of computing work is done on the server side by a process only on cipher text which leads data leakage and convinced data security.

af

Real time object tracking is a challenging task in computer vision. Many algorithms exist in literature like Mean shift, background-weighted histogram (BWH) and Corrected background-weighted histogram(CBWH).This paper attempts to do the comparative analysis of the three methods in terms of performance parameters like Normalised Centroid Distance , Overlap and number of iterations using two types of features i.e., color histogram and color texture histogram. Experimental results show that the performance of CBWH gives better performance when compared with basic Mean shift and BWH

Citation

:

af

S.Ummay Atiya,K.Swarna Madhuri,"Censored Data Transmission In Decentralized Between Two Army Station”, Macaw International Journal Of Advanced Research In Computer Science And Engineering (Mijarcse), 2(3):6-11,March-2016.
DOI: 10.22362/MIJARCSE/2016/v2/i03/4012

af

Wireless Sensor Networks in today’s world are the basic means of communication. An ad hoc network is a group of wireless nodes, in which each node can communicate over multihop paths to any other node without the help of any preexisting infrastructure such as base station or access points. Owing to these feature ad hoc low power wireless networks are capable of sensory and pervasive computing which forms the wireless ad hoc sensor network. The limitations of system are resources like battery power, communication range and processing capabilities. One of the major challenges in Wireless Sensor Networks is the security concerns. The attacks affecting these systems are increasing as they progress. One of the resource depletion attacks called vampire attacks are the major concern. They not only affect a single node but they bring down the entire system draining the power i.e. Battery power. In this paper, the system proposed overcomes this challenge by using the Energy load observing Algorithm (ELOA) and the energy consumption is reduced to a great-extend.

Citation

:

af

af

In this paper, we proposed a secured multi-owner data sharing scheme for a dynamic group in people, in general, cloud. By furnishing AES encryption with Convergent key while transferring the information, any cloud client can safely impart information to others. In the meantime, the capacity overhead and encryption calculation expense of the plan are free with the quantity of repudiated clients. Also, I break down the security of this plan with thorough confirmations. One-Time Secret word is one of the simplest and most well-known types of confirmation that can be utilized for securing access to accounts. One-Time Passwords are frequently alluded to as secure and more grounded types of confirmation in a multi-owner manner. Broad security and execution examination demonstrates that our proposed plan is profoundly productive and fulfills the security necessities for open cloud-based secure group sharing.

Citation

:

af

af

In this paper we exhibited a novel plan i.e Twofold Encryption for Safely Outsourcing the Information in Distributed computing This plan takes care of key escrow issue and Information Uncover issue by RSA calculation of topsy-turvy key methodology. In existing mCL-PKE plan there is Authentication less Encryption furthermore single encryption. In our proposed plan we have two layer encryption plans by this approach the information/data will be profoundly secured while safeguarding and partaking in cloud environment.

Citation

:

af

af

Cloud computing allow business customers to scale up and down their resource usage based on needs. Many of the touted gains in the cloud model come from resource multiplexing through virtualization technology. In this paper, we present a system that uses virtualization technology to allocate data center resources dynamically based on application demands and support green computing by optimizing the number of servers in use. We introduce the concept of “skewness” to measure the unevenness’ in the multi-dimensional resource utilization of a server. By minimizing skewness, we can combine different types of workloads nicely and improve the overall utilization of server resources. We develop a set of heuristics that prevent overload in the system effectively while saving energy used. Trace driven simulation and experiment results demonstrate that our algorithm achieves good performance

Citation

:

af

af

In this paper we demonstrates development of the energy efficiency (EE) of multi-user multiple-input multiple-output (MIMO) orthogonal frequency-division multiple access (OFDMA) system, an Energy-efficient multiple access (EMA) scheme is proposed. It improves EE by selecting either time-division multiple access (TDMA) or space-division multiple access (SDMA) based on the no. of users or power consumption. Here, we introduced normalization process for power in OFDM system to improve the power gain. Numerical results verify that the EE and power gain can be significantly improved through the proposed EMA scheme.